΢Èí³ÆVolt Typhoon×Ô2021ÄêÒ»Ö±Õë¶ÔÃÀ¹ú»ù´¡ÉèÊ©

Ðû²¼Ê±¼ä 2023-05-26

1¡¢Î¢Èí³ÆVolt Typhoon×Ô2021ÄêÒ»Ö±Õë¶ÔÃÀ¹ú»ù´¡ÉèÊ©


5ÔÂ24ÈÕ£¬£¬£¬£¬£¬Î¢Èí³ÆÖÁÉÙ´Ó 2021 ÄêÄêÖÐ×îÏÈ£¬£¬£¬£¬£¬Volt Typhoon¾ÍÒ»Ö±Õë¶ÔÃÀ¹ú¹ØµººÍÆäËü¸÷µØµÄÒªº¦»ù´¡ÉèÊ©¡£¡£¡£±»ÈëÇÖ×é֝ɿ¼°Õþ¸®¡¢º£Ê¡¢Í¨Ñ¶¡¢ÖÆÔì¡¢ÐÅÏ¢ÊÖÒÕ¡¢¹«ÓÃÊÂÒµ¡¢½»Í¨¡¢ÐÞ½¨ºÍ½ÌÓýÐÐÒµ¡£¡£¡£¹¥»÷ÕßÊ×ÏÈʹÓÃδ֪µÄÁãÈÕÎó²îÈëÇÖFortinet FortiGuard×°±¸£¬£¬£¬£¬£¬À´ÊµÏÖ¶ÔÄ¿µÄµÄ³õʼ»á¼û¡£¡£¡£È»ºóʹÓÃPowerShell¡¢Certutil¡¢NetshºÍWMICµÈLOLBinsÖ´ÐÐliving-off-the-land¹¥»÷¡£¡£¡£ÎåÑÛͬÃ˳ƣ¬£¬£¬£¬£¬¸ÃÍŻﻹʹÓÃÁË¿ªÔ´¹¤¾ß£¬£¬£¬£¬£¬Èçfrp¡¢MimikatzºÍImpacketµÈ¡£¡£¡£


https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/


2¡¢SuperVPNÒòÊý¾Ý¿âÉèÖùýʧй¶3.6ÒÚÌõÓû§¼Í¼


¾Ý5ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ãâ·ÑVPNЧÀÍSuperVPNÒòÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬£¬£¬Ð¹Â¶ÁË360308817ÌõÓû§¼Í¼£¬£¬£¬£¬£¬×ܼÆ133 GBÊý¾Ý¡£¡£¡£ÕâЩ¼Í¼³ýÁ˰üÀ¨Óû§ÓʼþµØµã¡¢Ô­Ê¼IPµØµã¡¢µØÀíλÖÃÊý¾ÝºÍЧÀÍÆ÷ʹÓüͼµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬»¹°üÀ¨ÃÜÔ¿¡¢Î¨Ò»Ó¦ÓóÌÐòÓû§IDºÅºÍUUIDºÅµÈ¡£¡£¡£ËäÈ»SuperVPNÉù³ÆËü²»´æ´¢Óû§ÈÕÖ¾£¬£¬£¬£¬£¬µ«Ð¹Â¶µÄÊý¾ÝÅú×¢ÕæÕæÏàÐβ¢·ÇÔÆÔÆ£¬£¬£¬£¬£¬ÕâÓë¸Ã¹«Ë¾µÄÕþ²ßÏàì¶Ü¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÔÚÊý¾Ý¿âÖл¹·¢Ã÷Storm VPN¡¢Luna VPN¡¢Radar VPN¡¢Rocket VPNºÍGhost VPNµÈVPNÌṩÉÌÃû³Æ£¬£¬£¬£¬£¬¿ÉÒÔÍÆ¶ÏËüÃÇÔÚijÖÖˮƽÉÏÊÇÏà¹ØµÄ¡£¡£¡£


https://www.hackread.com/free-vpn-service-supervpn-leaks-user-records/


3¡¢Akamai·¢Ã÷½©Ê¬ÍøÂçDark Frost DDoS¹¥»÷ÓÎÏ·ÐÐÒµµÄÆóÒµ


AkamaiÔÚ5ÔÂ25ÈÕ³ÆÆä·¢Ã÷ÁËÐÂÐͽ©Ê¬ÍøÂçDark Frost DDoS¹¥»÷ÓÎÏ·ÐÐÒµµÄÆóÒµ¡£¡£¡£¸ÃÍÅ»ïÖÁÉÙ´Ó2022Äê5ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬Õë¶ÔÓÎÏ·¹«Ë¾¡¢ÓÎϷЧÀÍÆ÷Íйܹ©Ó¦ÉÌ¡¢ÔÚÏßÁ÷ýÌåºÍÆäËûÓÎÏ·ÉçÇø³ÉÔ±¡£¡£¡£Í¨Ì«¹ýÎöÑо¿Ö°Ô±È·¶¨ËüµÄ¹¥»÷DZÁ¦Ô¼ÔÚ629.28 Gbps¡£¡£¡£¸Ã½©Ê¬ÍøÂçÒÔGafgyt¡¢QBot¡¢MiraiºÍÆäËü¶ñÒâÈí¼þΪÀ¶±¾£¬£¬£¬£¬£¬×èÖ¹2Ô·ݣ¬£¬£¬£¬£¬Ëü°üÀ¨414̨ÔËÐÐÖÖÖÖÖ¸Á¼Ü¹¹µÄ×°±¸£¬£¬£¬£¬£¬ÈçARMv4¡¢x86¡¢MIPSEL¡¢MIPSºÍARM7¡£¡£¡£¸Ã°¸ÀýµÄÌØÊâÖ®´¦ÔÚÓÚ£¬£¬£¬£¬£¬¹¥»÷ÕßÐû²¼ÁËËûÃǹ¥»÷µÄʵʱ¼Í¼£¬£¬£¬£¬£¬¹©ËùÓÐÈËÉó²é¡£¡£¡£


https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile


4¡¢Check Point¹ûÕæAgriusÍÅ»ïÕë¶ÔÒÔÉ«ÁеĹ¥»÷»î¶¯


5ÔÂ24ÈÕ£¬£¬£¬£¬£¬Check Point¹ûÕæÁËÒÁÀʺڿÍÍÅ»ïAgriusÕë¶ÔÒÔÉ«ÁÐ×éÖ¯µÄ¹¥»÷»î¶¯¡£¡£¡£¹¥»÷ÕßÊ×ÏÈͨ¹ýʹÓÃЧÀÍÆ÷ÖеÄÎó²î»ñµÃÄ¿µÄµÄ³õʼ»á¼ûȨÏÞ¡£¡£¡£È»ºóʹÓÃÒÔÉ«ÁеÄProtonVPN½Úµã·Ö·¢Òþ²ØÔÚ¡°Certificate¡±Îı¾ÎļþÖеÄASPXSpy webshell±äÌå¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬Agrius´Óufile.ioºÍeasyupload.ioµÈÕýµ±ÎļþÍÐ¹ÜÆ½Ì¨»ñÈ¡ÀÕË÷Èí¼þMoneybirdµÄ¿ÉÖ´ÐÐÎļþ¡£¡£¡£ÔÚÏÖÔÚ·¢Ã÷µÄ°¸ÀýÖУ¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þ½öÕë¶ÔF:\User Shares¡£¡£¡£ÕâÅú×¢MoneybirdµÄÄ¿µÄÆ«ÏòÓÚµ¼ÖÂÓªÒµÖÐÖ¹£¬£¬£¬£¬£¬¶ø²»ÊÇËø¶¨ÅÌËã»ú¡£¡£¡£


https://research.checkpoint.com/2023/agrius-deploys-moneybird-in-targeted-attacks-against-israeli-organizations/


5¡¢Barracuda³ÆÆäESGÖÐÎó²îCVE-2023-2868Òѱ»Ê¹ÓÃ


¾ÝýÌå5ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬Barracuda³Æ·¢Ã÷ÆäESG×°±¸ÖÐÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2023-2868£©Òѱ»Ê¹Óᣡ£¡£¸ÃÎó²îλÓÚµç×ÓÓʼþ¸½¼þɸѡÄ£¿£¿£¿£¿éÖУ¬£¬£¬£¬£¬Ô´ÓÚÓû§ÌṩµÄ.tarÎļþµÄÊäÈëÑéÖ¤²»ÍêÕû¡£¡£¡£Îó²îÓÚ5ÔÂ19ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬²¢ÓÚ5ÔÂ20ÈÕºÍ21ÈÕÐû²¼µÄÁ½¸öÇå¾²²¹¶¡Öб»ÐÞ¸´¡£¡£¡£Barracuda͸¶£¬£¬£¬£¬£¬Æä²¿·Ö¿Í»§µÄESG×°±¸Ôâµ½¹¥»÷£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓøÃÎó²î¶Ôµç×ÓÓʼþÍø¹Ø×°±¸×Ó¼¯µÄ¾ÙÐÐδÊÚȨµÄ»á¼û¡£¡£¡£BarracudaÌåÏÖ£¬£¬£¬£¬£¬ÊÓ²ì½öÏÞÓÚÆäESG²úÆ·£¬£¬£¬£¬£¬½¨ÒéÊܵ½Ó°ÏìµÄ×éÖ¯ÔÙ¼ì²éÒ»ÏÂËûÃǵÄÍøÂ磬£¬£¬£¬£¬ÒÔÈ·¶¨ÆäËüϵͳÊÇ·ñ±»ÈëÇÖ¡£¡£¡£


https://securityaffairs.com/146620/hacking/barracuda-email-security-gateway-bug.html


6¡¢WP Cookie Consent²å¼þÖеÄXSSÎó²îÒѱ»´ó¹æÄ£Ê¹ÓÃ


5ÔÂ24ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁË´ó¹æÄ£Ê¹ÓÃWordPress Cookie Consent²å¼þBeautiful Cookie Consent BannerÖÐXSSÎó²îµÄ»î¶¯¡£¡£¡£Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔÚÔËÐиòå¼þµÄWordPressÍøÕ¾ÉϽ¨Éè¶ñÒâÖÎÀíÔ±ÕÊ»§£¬£¬£¬£¬£¬Îó²îÒÑÓÚ1Ô·ݱ»ÐÞ¸´¡£¡£¡£Æ¾Ö¤¼Í¼£¬£¬£¬£¬£¬¸ÃÎó²î×Ô2ÔÂ5ÈÕÒÔÀ´Ò»Ö±±»Æð¾¢Ê¹Óᣡ£¡£×Ô5ÔÂ23ÈÕÒÔÀ´£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒѾ­¼ì²âµ½À´×Ô½ü14000¸öIPµØµãµÄ½ü300Íò´ÎÕë¶ÔÁè¼Ý150Íò¸öÍøÕ¾µÄ¹¥»÷£¬£¬£¬£¬£¬²¢ÇÒ£¬£¬£¬£¬£¬ÏÖÔÚ¹¥»÷ÈÔÔÚ¼ÌÐø¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-target-15m-wordpress-sites-with-cookie-consent-plugin-exploit/